Protectimus logo

Protectimus SHARK

A classic TOTP security token that fits on a keychain. The Protectimus SHARK MFA token device generates time-based one-time passwords following the TOTP OATH standard, with added security thanks to support for the SHA-256 algorithm. These TOTP hardware tokens feature embedded secret keys that cannot be reprogrammed.
TOTP token Protectimus SHARK
Montgomery county logo
University of Wisconsin Stevens Point logo
Kobenhavns Kommune
Frederiksberg Kommune logo
Mobile County Alabama logo
P&O logo
Business Computer logo
City of Lowell logo
Quebec logo
Skyworks logo

How Protectimus SHARK work

The Protectimus SHARK TOTP hardware token offers exceptional security features by supporting TOTP (RFC 6238) and SHA-256 algorithms, meeting OATH standards.

The key benefit of the Protectimus SHARK TOTP hardware token is its support for the superior SHA-256 algorithm, which offers stronger protection against brute force attacks.

It’s important to note that standalone use of the Protectimus SHARK TOTP hardware token is not possible. A third-party system is required to verify the value generated from the MFA token to complete authentication.

You can use Protectimus SHARK with Protectimus Cloud Service or On-Premise Platform, or with any other 2FA service that supports SHA256 TOTP tokens.

SHA-256 algorithm support

SHA-256 algorithm provides a stronger level of security compared to SHA-1. SHA-1 is an older algorithm that has been found to be vulnerable to attacks, while SHA-256 offers enhanced protection against brute force attacks. With Protectimus SHARK TOTP hardware token, your data and resources are kept secure with the latest and most reliable security technology available.

Drop-proof and moisture-resistant

The Protectimus SHARK 2FA token is designed to withstand harsh conditions, featuring robust construction and water resistance. The token is fully protected against dust and can operate even when submerged in water up to a depth of 1 meter. Its durable construction shields it from damage in the event of falls, ensuring longevity and reliability.

User-friendly design

The Protectimus SHARK MFA token device features an ergonomic design that is both stylish and functional. The token is designed to fit conveniently on a keyring, reducing the risk of losing it. With its compact size and sleek appearance, the Protectimus SHARK TOTP hardware token is a practical and attractive solution for two-factor authentication needs.

Here what our customers say

  • SICIM
  • DXC
  • Volet

At the moment, my assessment of the company’s work is 10 out of 10. An important factor in choosing this two-factor authentication provider was the possibility of customizing the 2FA system for our project. After we got in touch with the Protectimus team and explained the task, they implemented the necessary functionality for us free of charge. There were no problems. Everything works well.

Cristian G, System Administrator at SICIM

Protectimus was chosen because of their unique Dynamic Strong Password Authentication (DSPA) technology. Using this product, we added 2FA to all the systems we needed to protect in one fell swoop, as it allowed us to integrate two-factor authentication services straight with Active Directory. We have been using the Protectimus two-factor authentication platform for a year and are satisfied with this product.

Mauro S., Xchanging Italy a DXC Technology

Over the past years, we’ve had only positive cases of working together. Protectimus helped us at every stage, from integration to adding additional features that solved our specific tasks. Using Protectimus, we are confident that Volet infrastructure and users are well protected. Protectimus gives us what money can’t buy – not a sense of security, but REAL security. I highly recommend it for implementation.

Artem Sh., Info Security Director at Volet

Specifications

Protectimus SHARK SHA-256 TOTP token with dimensions indicated
Weight16.1 g (0,57 oz)
DisplayLCD 6 digits
AlgorithmOATH compliant time based TOTP
CryptographicsSHA-256
Time interval30/60 seconds (Optional)
Operating temperature0°C - 40°C (32°F - 104°F)
Humidity0 - 90% without condensation
Battery3-5 years
MaterialPC+ABS
Physical resistanceIP67
Show more

Pricing

Number of tokens you orderPrice per token
1—99$14.99
100—499$14.49
500—999$13.99
1000—4999$12.99
5000 and more$11.99

Brief Description

This hardware token offers exceptional security features by supporting TOTP (RFC 6238) and SHA-256 algorithm

Protectimus SHARK
How to use

Step 1 icon

Press the button, the One-Time-Password code will appear on the screen.

Step 2 icon

The screen may go off because of the expiration of the OTP interval (i.e. 30 or 60 seconds), you can press the button again to generate a new code.

Step 3 icon

Input the code to the web page or application.

Step 4 icon

The screen will go off automatically once the code expires.

Knowledge Base

The SHA-256 algorithm offers superior security compared to SHA-1 due to several reasons. Firstly, it provides stronger collision resistance, making it more challenging for attackers to generate two different inputs that result in the same hash value. Secondly, SHA256 produces a longer 256-bit hash value, providing more security and making it more difficult for attackers to find a collision. Moreover, there are no known successful attacks against SHA256, whereas SHA1 has demonstrated weaknesses, including practical attacks that can produce collisions. As a result, the SHA256 algorithm is the recommended choice for cryptographic purposes and is ideal for use in TOTP security tokens.

The TOTP (Time-based One-Time Password) algorithm for two-factor authentication functions by merging a secret key with the present time to produce a one-time password (OTP). In Protectimus SHARK this password is generated using the SHA-256 hash function, which produces a fixed-length output of 256 bits. The use of SHA-256 makes the TOTP algorithm more secure and less susceptible to attacks, as it is a highly secure hash function that is widely used in various security protocols and applications. The OTP is only functional for a brief stretch of time, which is 30 seconds in the case of Protectimus SHARK, after which a new OTP is created. In order to configure TOTP authentication, it is vital for the device of the user and the authentication server to have the same secret key.

The classic TOTP hardware 2FA tokens come with secret keys that are pre-installed by the manufacturer and cannot be altered. When a user obtains their TOTP hardware token from a vendor, the secret key must be added to the authentication server, which may require the end-user or their system admin to be granted access to the validating server, which is not always feasible. Protectimus SHARK tokens are classic TOTP hardware tokens, you may use them with Protectimus two-factor authentication system or any other authentication system that supports OATH standards.

The Protectimus SHARK TOTP hardware token is an excellent choice for 2FA, providing exceptional security features by supporting TOTP (RFC 6238) and SHA-256 algorithms, meeting OATH standards. The most significant advantage of the Protectimus SHARK TOTP hardware token is its support for the superior SHA-256 algorithm, which provides better protection against cyber attacks.The Protectimus SHARK 2FA security token is an extremely dependable method of authentication. These TOTP hardware tokens function offline, making them impervious to hacking and interception of one-time passwords. Additionally, they have a robust construction and are waterproof, which ensures they have a lifespan of 3 to 5 years.

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.